提出 #748073: Wavlink WN579A3 20210219 Command Injection情報

タイトルWavlink WN579A3 20210219 Command Injection
説明A vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument SSID2G2 leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
ソース⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/multi_ssid.md
ユーザー
 Anonymous User
送信2026年01月28日 09:09 (3 月 ago)
モデレーション2026年02月15日 10:01 (18 days later)
ステータス承諾済み
VulDBエントリ346114 [Wavlink WL-WN579A3 迄 20210219 /cgi-bin/wireless.cgi multi_ssid SSID2G2 特権昇格]
ポイント19

Do you need the next level of professionalism?

Upgrade your account now!